News

Cryptocurrencies like Bitcoin are increasingly attracting millions of users, but also cybercriminals, as a successful attack means maximum profit with little risk. This also applies to "ether," the most widely used cryptocurrency after Bitcoin. As a precautionary measure, researchers at the CISPA Helmholtz Center i.G. at Saarland University have developed a methodology for this cryptocurrency that not only finds security vulnerabilities, but also uses them to automatically develop attacks. The result: they found 815 security holes that allow 1564 attacks. The Saarbrucken computer scientists present their approach on Wednesday at the international USENIX Security Symposium in Baltimore, USA.